Advances, Systems and Applications
Computation Party | [23] | [24] | [25] | [28] | [38] | The proposed AMAKAS scheme |
---|---|---|---|---|---|---|
Mutual authentication | √ | √ | √ | √ | √ | √ |
User anonymity | x | √ | √ | √ | x | √ |
User Un-traceability | x | √ | x | x | x | √ |
Forward secrecy | √ | √ | √ | √ | √ | √ |
User impersonation attack | √ | √ | √ | √ | x | √ |
Sever impersonation attack | x | x | × | √ | √ | √ |
Replay attack | √ | √ | √ | √ | x | √ |
Stolen card attack | √ | √ | √ | √ | x | √ |
Man-in-the-middle attack | x | √ | x | √ | x | √ |
Known session specific temporary information attack | x | x | x | √ | x | √ |